z-logo
Premium
Study of trust‐based mechanism and its component model in MANET: Current research state, issues, and future recommendation
Author(s) -
Khanitin,
Sachdeva Monika
Publication year - 2019
Publication title -
international journal of communication systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.344
H-Index - 49
eISSN - 1099-1131
pISSN - 1074-5351
DOI - 10.1002/dac.4012
Subject(s) - computer science , reputation , component (thermodynamics) , computer security , routing (electronic design automation) , authentication (law) , mobile ad hoc network , process (computing) , computational trust , trust management (information system) , mechanism (biology) , task (project management) , field (mathematics) , work (physics) , cryptography , computer network , social science , physics , sociology , network packet , thermodynamics , operating system , mechanical engineering , philosophy , management , mathematics , epistemology , pure mathematics , engineering , economics
Summary Security against routing attacks in MANET is most critical issue and traditional concepts of cryptography, authentication, or Watchdog are not that significant in mitigation of these attacks. In recent years, trust‐based approach provides a reputation system that compose of different components to provide security against routing attacks. In this paper, we provide an in‐depth analysis of various components that are used in trust‐based mechanism and techniques deployed in effective and efficient execution of task by the components. Trust‐based mechanisms generally have five components: monitoring and information gathering, trust calculation and evaluation unit, trust recommendation unit, decision‐making and dissemination of detection unit. All or some of these units cooperate together to provide a reliable communication environment with the aim to prevent routing attacks from participating in route formation process and detect attacking nodes simultaneously. Different routing attacks and measures in trust‐based mechanism along with some published work are discussed to understand the implementation of this type of mechanism. Various related issues are explored, discussed, and recommendations are pointed out for future research work in this field.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here